Analysis
-
max time kernel
141s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 12:47
Static task
static1
Behavioral task
behavioral1
Sample
34c83309811e423efae8cbfc4b547960_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
34c83309811e423efae8cbfc4b547960_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
34c83309811e423efae8cbfc4b547960_JaffaCakes118.exe
-
Size
182KB
-
MD5
34c83309811e423efae8cbfc4b547960
-
SHA1
82f0e89902aaf1ff8f6d0eba919e8ed898146cd1
-
SHA256
491d9e732242cdba0204ba8df4c3674552ceb8af0276ed5d9deaf14964cfc805
-
SHA512
ef69e62ae790164323ff407953f78c4b27c6214827e88116121f781dab100c3d074c967d671631a5dd10fc69059ee9ca92fd0c020a03890fc7f004b0100a7380
-
SSDEEP
3072:DNBa/wP//jQ63yYSlzYhhjt46dM34GUTWul+mRTBETGyJwg0vaRHMtqv1DbmOaNC:DNB1/06iYIYhhjt46zDxl5hBET1CXvXw
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2368-2-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/2888-5-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/2952-83-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/2368-84-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/2368-187-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/2368-192-0x0000000000400000-0x0000000000443000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 34c83309811e423efae8cbfc4b547960_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2888 2368 34c83309811e423efae8cbfc4b547960_JaffaCakes118.exe 29 PID 2368 wrote to memory of 2888 2368 34c83309811e423efae8cbfc4b547960_JaffaCakes118.exe 29 PID 2368 wrote to memory of 2888 2368 34c83309811e423efae8cbfc4b547960_JaffaCakes118.exe 29 PID 2368 wrote to memory of 2888 2368 34c83309811e423efae8cbfc4b547960_JaffaCakes118.exe 29 PID 2368 wrote to memory of 2952 2368 34c83309811e423efae8cbfc4b547960_JaffaCakes118.exe 31 PID 2368 wrote to memory of 2952 2368 34c83309811e423efae8cbfc4b547960_JaffaCakes118.exe 31 PID 2368 wrote to memory of 2952 2368 34c83309811e423efae8cbfc4b547960_JaffaCakes118.exe 31 PID 2368 wrote to memory of 2952 2368 34c83309811e423efae8cbfc4b547960_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\34c83309811e423efae8cbfc4b547960_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\34c83309811e423efae8cbfc4b547960_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\34c83309811e423efae8cbfc4b547960_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\34c83309811e423efae8cbfc4b547960_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\34c83309811e423efae8cbfc4b547960_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\34c83309811e423efae8cbfc4b547960_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD54b0974d2d4b602aa85712220cbc94e68
SHA1317dcf879a9c0e8f565f37e6cf2056376be3569e
SHA25607b37f45176e5392675df4741b026317ecd1a484eac5fe03de319e5d3f9421a2
SHA512dbed4143445f0229422d8194463f897340df0c38910888dac4b6dfa7809ce39a061b2a373e8b367f4b490f5f0d2a7b8cc7bc572e98c13ddb90187a0f0ec541ff
-
Filesize
1KB
MD583b4766a9cb004e8c103bca15f290cb8
SHA1768f2f68c6f2d35be4ac0a4d6f06986764bea143
SHA256d5d4e9a769f12a6db53ed82cdc490cc8ae95d6fdc493a9ce3009f6d09a78007a
SHA512eaab58350b02953171abbca15d53d2126231943a0718eb89514e04354bd950c6fceef1eaea0a487f5b0d0c6d0b7ee17c6a6c3311ebb279ae449a52197c26f484
-
Filesize
996B
MD5fd27ac29a3fa9689bbc9f676cab4e76a
SHA13d2a7d295f81b85e121ef4f2a56750b8dd47939f
SHA256ecb9670e4d9ddd6cf3878042760cde0bb0d14a53a2339015073c97a5d9868949
SHA51294db872c6d6334d410638c36ffbecb0ed885f7c71f6c0c7fd111ba616f7f00134d81f246fa1fa00f720a30afeb50a99d6ffc9732464c2df10320be8fc496ddb7